CN107844714A - A kind of verification method and device, computer installation, readable storage medium storing program for executing - Google Patents

A kind of verification method and device, computer installation, readable storage medium storing program for executing Download PDF

Info

Publication number
CN107844714A
CN107844714A CN201711059135.5A CN201711059135A CN107844714A CN 107844714 A CN107844714 A CN 107844714A CN 201711059135 A CN201711059135 A CN 201711059135A CN 107844714 A CN107844714 A CN 107844714A
Authority
CN
China
Prior art keywords
verification
data
module
default
memory
Prior art date
Legal status (The legal status is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the status listed.)
Granted
Application number
CN201711059135.5A
Other languages
Chinese (zh)
Other versions
CN107844714B (en
Inventor
古亮
李诗逸
赵辉宇
吴大立
李庆
Current Assignee (The listed assignees may be inaccurate. Google has not performed a legal analysis and makes no representation or warranty as to the accuracy of the list.)
Sangfor Technologies Co Ltd
Original Assignee
Sangfor Technologies Co Ltd
Priority date (The priority date is an assumption and is not a legal conclusion. Google has not performed a legal analysis and makes no representation as to the accuracy of the date listed.)
Filing date
Publication date
Application filed by Sangfor Technologies Co Ltd filed Critical Sangfor Technologies Co Ltd
Priority to CN201711059135.5A priority Critical patent/CN107844714B/en
Publication of CN107844714A publication Critical patent/CN107844714A/en
Application granted granted Critical
Publication of CN107844714B publication Critical patent/CN107844714B/en
Active legal-status Critical Current
Anticipated expiration legal-status Critical

Links

Classifications

    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F21/00Security arrangements for protecting computers, components thereof, programs or data against unauthorised activity
    • G06F21/60Protecting data
    • G06F21/64Protecting data integrity, e.g. using checksums, certificates or signatures
    • GPHYSICS
    • G06COMPUTING; CALCULATING OR COUNTING
    • G06FELECTRIC DIGITAL DATA PROCESSING
    • G06F11/00Error detection; Error correction; Monitoring
    • G06F11/07Responding to the occurrence of a fault, e.g. fault tolerance
    • G06F11/0703Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation
    • G06F11/0706Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment
    • G06F11/0709Error or fault processing not based on redundancy, i.e. by taking additional measures to deal with the error or fault not making use of redundancy in operation, in hardware, or in data representation the processing taking place on a specific hardware platform or in a specific software environment in a distributed system consisting of a plurality of standalone computer nodes, e.g. clusters, client-server systems

Landscapes

  • Engineering & Computer Science (AREA)
  • Theoretical Computer Science (AREA)
  • General Engineering & Computer Science (AREA)
  • Computer Security & Cryptography (AREA)
  • Computer Hardware Design (AREA)
  • Physics & Mathematics (AREA)
  • General Physics & Mathematics (AREA)
  • Quality & Reliability (AREA)
  • Health & Medical Sciences (AREA)
  • Bioethics (AREA)
  • General Health & Medical Sciences (AREA)
  • Software Systems (AREA)
  • Debugging And Monitoring (AREA)
  • Techniques For Improving Reliability Of Storages (AREA)

Abstract

The embodiment of the invention discloses a kind of verification method and device, computer installation, readable storage medium storing program for executing; for finding mistake in time in the distributed file system designed based on stack module; prevent error diffusion; more reliable protection is provided; help orientation problem; so as to help to design more reliable distributed file system, data integrity protection is better achieved.Present invention method is applied to the distributed file system based on the design of stack module, and distributed file system includes N number of module, and N is the positive integer not less than 2, and this method includes:When module M receives the first data, detect whether default region of memory is stored with the first verification corresponding to the first data and M is the positive integer no more than N;If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.

Description

A kind of verification method and device, computer installation, readable storage medium storing program for executing
Technical field
The present invention relates to data processing field, more particularly to a kind of verification method and device, computer installation, readable storage Medium.
Background technology
Keep the most important thing that data integrity is modern memory systems.At present, have various technologies be developed and Using improving the protection of data integrity, most common of which, it is most popular be exactly verification and method.
Traditional is generally divided into two classes for the verification of storage system and method:One kind is end-to-end verification, another kind of to be Disk verify and.Wherein, for end-to-end verification, data is usually transmitted to back-end system interface in application program and starts and makes With verification and protection, afterwards until data are read out just using verifying and verified, but mistake hair like this be present The defects of now slow, and if when data do not return, cannot just carry out checksum validation.And disk verifies and writes number in disk According to when can with the verification of calculating and together with store, being read out afterwards in data can also be using verification and to be verified. But end-to-end verification or disk verify and all not to the heap similar to glusterfs (a kind of distributed file system) Each intermodule of stacked file system carries out checksum validation, to realize the protection of data integrity.
The content of the invention
The embodiments of the invention provide a kind of verification method and device, computer installation, readable storage medium storing program for executing, in base Find mistake in time in the distributed file system of stack module design, prevent error diffusion, there is provided more reliable protection, Orientation problem is helped, so as to help to design the more reliable distributed file system based on the design of stack module, preferably Realize data integrity protection.
In view of this, first aspect present invention provides a kind of verification method, applied to point designed based on stack module Cloth file system, distributed file system include N number of module, and N is the positive integer not less than 2, it may include:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
Further, the first verification whether is stored with before in the default region of memory of detection, method also includes:
Whether detection module M default verification switch is opened;
If so, then detection trigger preset region of memory whether be stored with the first verification and the step of.
Further, method also includes:
Determine the load of distributed file system;
Verification switch is preset according to corresponding to the height of load opens W module, W is the positive integer no more than N.
Further, verification switch is preset according to corresponding to the height of load opens W module to be included:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
Further, when M is 1, it is opening to preset verification switch;
When M is N, it is opening to preset verification switch.
Further, method also includes:
If default region of memory do not store the first verification and, or module M default verification switch do not open, or the second verification With with the first verification and identical, then the first data are sent to module M+K, K is -1 or 1.
Further, method also includes:
When default region of memory do not store the first verification and when, default storage region storage second verification and, or storage Second verification and with default magic number, the first data length of the first data, the first data predeterminated position the first sampled data At least one of, and using second verification and as first verification with.
Further, when default storage region be stored with the first verification and with the first verification and corresponding second data the During two data lengths, verified using the first data generation second with before, method also includes:
Detect whether the second data length changes;
If it is not, then triggering using the first data generation second verification and the step of.
Further, when default storage region, which is also stored with detection, presets magic number, whether the second data length is being detected Before changing, method also includes:
Detection presets whether magic number changes;
If it is not, the step of then whether data length of detection trigger second changes.
Further, during the second sampled data of the predeterminated position for being also stored with the second data when default storage region, if Second verification and with first verification and it is identical, then sending the first data to module M+K includes:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
Second aspect of the present invention provides a kind of checking device, applied to the distributed field system designed based on stack module System, distributed file system include N number of module, and N is the positive integer not less than 2, it may include:
First detection unit, for when module M receives the first data, detect whether default region of memory is stored with the First verification corresponding to one data and, M is positive integer no more than N;
Generation unit, for when default region of memory be stored with the first verification and when, then utilize the first data generation second Verification and;
Comparison unit, for verifying and being contrasted by the second verification and with first;
First determining unit, for when second verifies and verify and differ with first, it is determined that the first data are in mould There is mistake in block M.
Further, device also includes:
Whether the second detection unit, the default verification switch for detection module M are opened;
First trigger element, for when module M default verification is switched and opened, then it is pre- to trigger the detection of the first detection unit If region of memory whether be stored with the first verification and.
Further, device also includes:
Second determining unit, for determining the load of distributed file system;
Opening unit, for presetting verification switch according to corresponding to the height of load W module of unlatching, W is no more than N's Positive integer.
Further, opening unit, it is specifically used for:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
Further, when M is 1, it is opening to preset verification switch;
When M is N, it is opening to preset verification switch.
Further, device also includes:
Transmitting element, for when default region of memory do not store the first verification and, or module M default verification switch do not open Open, or the second verification and with the first verification and it is identical when, then the first data are sent to module M+K, K is -1 or 1.
Further, device also includes:
Memory cell, for when default region of memory do not store the first verification and when, default storage region store second Verification and, or the verification of storage second and with default magic number, the first data length of the first data, the first data predeterminated position At least one of first sampled data, and using second verification and as first verification with.
Further, when default storage region be stored with the first verification and with the first verification and corresponding second data the During two data lengths, device also includes:
3rd detection unit, for detecting whether the second data length changes;
Second trigger element, for when the second data length does not change, then triggering generation unit using the first number According to generation second verification and.
Further, when default storage region, which is also stored with detection, presets magic number, device also includes:
4th detection unit, for detecting whether default magic number changes;
3rd trigger element, for when default magic number does not change, then triggering the number of the 3rd detection unit detection second Whether changed according to length.
Further, during the second sampled data of the predeterminated position for being also stored with the second data when default storage region, hair Unit is sent, is specifically used for:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
Third aspect present invention provides a kind of computer installation, applied to the distributed document designed based on stack module System, distributed file system include N number of module, and N is the positive integer not less than 2, and computer installation includes processor, processor During for performing the computer program stored in memory, following steps are realized:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
Fourth aspect present invention provides a kind of computer-readable recording medium, applied to point designed based on stack module Cloth file system, distributed file system include N number of module, and N is the positive integer not less than 2, is stored on readable storage medium storing program for executing There is computer program, when computer program is executed by processor, realize following steps:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
As can be seen from the above technical solutions, the embodiment of the present invention has advantages below:
The embodiments of the invention provide a kind of verification method, when in the distributed file system designed based on stack module Module M when receiving the first data, can detect whether default region of memory is stored with first corresponding to the first data in advance Verification and, first verification and storage in the case of, can utilize module M receive the first data generation second verification and, And can verify and be contrasted by the second verification and with first, to be verified to the first data that module M is received, if second Verification and with the second verification and differing, then can determine that the first data mistake occur in module M, then can immediately positioning the The Error Location of one data, and the upload of the first data can be blocked in time or issued, the diffusion of the first data of mistake is prevented, More reliable protection is provided, so as to help to design the more reliable distributed file system based on the design of stack module, more Realize data integrity protection well.
Brief description of the drawings
Fig. 1 is verification method one embodiment schematic diagram in the embodiment of the present invention;
Fig. 2 is another embodiment schematic diagram of verification method in the embodiment of the present invention;
Fig. 3 is another embodiment schematic diagram of verification method in the embodiment of the present invention;
Fig. 4 is another embodiment schematic diagram of verification method in the embodiment of the present invention;
Fig. 5 is another embodiment schematic diagram of verification method in the embodiment of the present invention;
Fig. 6 is that device one embodiment schematic diagram is verified in the embodiment of the present invention;
Fig. 7 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Fig. 8 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Fig. 9 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Figure 10 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Figure 11 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention;
Figure 12 is that another embodiment schematic diagram of device is verified in the embodiment of the present invention.
Embodiment
The embodiments of the invention provide a kind of verification method and device, computer installation, readable storage medium storing program for executing, in base Find mistake in time in the distributed file system of stack module design, prevent error diffusion, there is provided more reliable protection, Orientation problem is helped, so as to help to design the more reliable distributed file system based on the design of stack module, preferably Realize data integrity protection.
In order that those skilled in the art more fully understand the present invention program, below in conjunction with the embodiment of the present invention Accompanying drawing, the technical scheme in the embodiment of the present invention is clearly and completely described, it is clear that described embodiment is only The embodiment of a part of the invention, rather than whole embodiments.Based on the embodiment in the present invention, ordinary skill people The every other embodiment that member is obtained under the premise of creative work is not made, it should all belong to the model that the present invention protects Enclose.
Term " first ", " second ", " the 3rd " in description and claims of this specification and above-mentioned accompanying drawing, " The (if present)s such as four " are for distinguishing similar object, without for describing specific order or precedence.It should manage The data that solution so uses can exchange in the appropriate case, so that the embodiments described herein can be with except illustrating herein Or the order beyond the content of description is implemented.In addition, term " comprising " and " having " and their any deformation, it is intended that Cover it is non-exclusive include, for example, containing the process of series of steps or unit, method, system, product or equipment need not limit In those steps or unit for clearly listing, but may include not list clearly or for these processes, method, production The intrinsic other steps of product or equipment or unit.
For ease of understanding, the idiographic flow in the embodiment of the present invention is described below, referring to Fig. 1, the present invention is real Applying verification method one embodiment in example includes:
101st, when module M receives the first data, detect whether default region of memory is stored with corresponding to the first data First verification and;
In the present embodiment, the distributed file system based on the design of stack module can include N number of module, pass through this point Cloth file system can be write first data into disk, returned after can also the first data be read from disk/solid-state disk Return.In the write-in of the first data or reading process, the first data can with distributed file system a module upload or It is issued to another module.Wherein, N is the positive integer not less than 2.
In the write-in of the first data or reading process, when the module M in the distributed file system receives the first number According to when, can detect in advance default region of memory whether be stored with corresponding to the first data the first verification and.
Wherein, the first verification and using the first data by verifying or first to enter the first of distributed file system Data generate, and are stored in default region of memory, such as cache, for examining the first data mould in distributed file system Whether mistake is occurred in the transmitting procedure of block, and specific generating mode is as follows:
The first:
When receiving the write request for the first data, and heap is initially entered from upper level applications in the first data During the module K of stacked file system, first verifies and first data can be utilized to generate, and is stored in default region of memory In, for checking of first data when sending other modules into distributed file system.
Second:
When receiving the read requests for the first data, and pulled back in the first data since disk/solid-state disk During the module K of stackable file system, first verifies and first data can be utilized to generate, and is stored in and default internal memory In region, for checking of first data when sending other modules into distributed file system.
The third:
When receiving the write request or read requests for the first data, when the first data are from distributed file system In modules A when sending to another module B, if the first data in modules A by checking, that is, giving tacit consent to the first data just Really, then the second verification of the first data generation that can be received by the use of modules A and as the first verification with and this can be made The second verification for the first verification sum and it is stored in default region of memory, can be with for the first data when sending to module B The first data that module B is received are verified.
It is understood that in such a mode, default storage region there may be multiple first verifications and, i.e., each After the first data that module receives are by checking, it can generate corresponding first verification and be stored, can also only be deposited And, but the first verification and generated by received using next module and the first data by checking in one first verification Verification and renewal, are not specifically limited herein.
It should be noted that when default storage region exist multiple first verifications and when, this multiple first verification and can be with Mapping relations are established between corresponding module and are distinguish between, in favor of it is proper use of it is corresponding first verification and.
In the present embodiment, N is the positive integer not less than 2, and M, K, A, B are the positive integer no more than N.
If the 102nd, preset region of memory be stored with the first verification and, using the first data generation second verification and, and will Second verifies and verifies and contrasted with first;
In the present embodiment, if default storage region is stored with the first verification and can utilize the first data generation second Verification and, and can by second verification and with first verification and contrasted, with judge second verification and whether with first verify With it is identical.
In the present embodiment, prior art is referred to using the method for the first data generation the second verification sum, herein no longer Repeat.
If the 103rd, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
In the present embodiment, if second verifies and verify and differ with first, it can determine that the first data go out in module M Existing mistake.
Further, it is determined that the first data after mistake occurs in module M, can block the first number in time with locating module M According to sending to pulling back to a upper module or being issued to next module, reporting an error for the first data can also be carried out, to cause work Error reason of first data in module M can be analyzed by making personnel.
If the 104th, preset region of memory do not store the first verification and, if or second verification and with first verification and it is identical, First data are sent to module M+K.
In the present embodiment, if default region of memory does not store the first verification and can sent the first data to module M +K.Wherein, K can be -1 or 1.
Specifically, what ought be received is the write request of the first data, K can be 1, i.e. the first data pass through in module M After checking, the first data can be sent with slave module M to module M next module;And when receive be the first data reading Request is taken, K can be -1, i.e. after module M is by checking, the first data can be sent to module M's the first data with slave module M A upper module.
It is understood that in the present embodiment, if the second verification and with the first verification and identical, the first number can be determined Do not occur mistake according in module M, then can also slave module M the first data are sent to module M+K.
Further, the first verification is not stored in default storage region and/or determine that the first data do not occur mistake in module M After by mistake, the second verification of the first data that can be received as needed using module M generation and default region of memory is stored in In, this second verification and can update the first verification and, can also without renewal, be not specifically limited herein.
It should be noted that in the present embodiment, first module of distributed file system can be module 1, can also For module N, module 1 to module N is to represent a kind of sortord of N number of module, is not specifically limited herein.
In the present embodiment, when the module M in the distributed file system designed based on stack module receives the first number According to when, can detect in advance default region of memory whether be stored with corresponding to the first data the first verification and, in the first verification and In the case of storage, can utilize module M receive the first data generation second verification and, and can by second verification and with First verifies and is contrasted, to be verified to the first data that module M is received, if second verifies and with the second verification and not It is identical, then it can determine that the first data mistake occur in module M, then the Error Location of the first data can be immediately positioned, and The upload of the first data can be blocked in time or is issued, and prevent the diffusion of the first data of mistake, there is provided more reliable protection, from And help to design the more reliable distributed file system based on the design of stack module, data integrity guarantor is better achieved Shield.
Referring to Fig. 2, another embodiment of verification method includes in the embodiment of the present invention:
201st, when module M receives the first data, whether detection module M default verification switch is opened;
In the present embodiment, based on stack module design distributed file system modules can be respectively equipped with it is pre- If verification switch, the default verification switch can enter Mobile state and turn off or on.When module M default verification is switched and opened, Mean that module M the first data received can be verified, conversely, being then intended to directly pull back to the first data A upper module is issued to next module.Thus, when module M receives the first data, can first detection module M it is pre- If whether verification switch is opened.
Wherein, presetting verification switch includes write check switch or read check switch, and writing for the first data is directed to when receiving When entering to ask, the default verification switch can be that write check switchs, and when receiving the read requests for the first data, should Default verification switch can be that read check switchs.
In actual applications, can basis when in N number of module of the distributed file system designed based on stack module The default verification for opening W module therein is needed to switch, concrete mode is as follows:
Determine the load of distributed file system;
Verification switch is preset according to corresponding to the height of load opens W module, W is the positive integer no more than N.
Specifically, the load of above-mentioned distributed file system can be divided into Three Estate, it is assumed that provided with load threshold T1, T2, then when load is higher than T1, it may be determined that be high capacity, when loading in the range of T1, T2, it may be determined that in being Load, when load is less than T2, it may be determined that be low-load.According to the different brackets of load, the mould of varying number can be opened The default verification switch of block, load is higher, and the quantity for closing the module of default verification switch is more.It is understood that this reality Other manner can also be used by applying the classification of the grade of load in example on distributed file system, and the present embodiment is only for example It is bright.
Thus,, can be with after the load for determining above-mentioned distributed file system in the write-in of the first data or reading process It is determined that the now grade of load of distributed file system, so that it is determined that opening the quantity of the module of default verification switch.
Further,, can be with when needing to open to presetting verification switch corresponding to W module in the present embodiment W module is selected in N number of module of distributed file system, selection mode is as follows:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
Specifically, in N number of module of distributed file system, the importance of N number of module can be first determined, and can incite somebody to action The importance of N number of module according to from high to low principle sort, then can according to the height of the load of distributed file system, The W forward module of selected and sorted in N number of module, and open and verification switch is preset corresponding to this W module.Pass through such a side Formula, intermodule accordingly verification and the expense for calculating and verifying can be effectively reduced, so as in the negative of distributed file system When carrying higher, it is possible to reduce influence of the high capacity to systematic function.
In the present embodiment, optionally, when M is 1, it can be opening to preset verification switch, when M is N, preset school It can also be opening to test switch, i.e., in N number of module of distributed file system, first module and last module pair The default verification switch answered is opened, to improve the detectability for occurring mistake on read/write path to the first data.
If the 202, module M default verification switch is opened, detect default region of memory whether be stored with the first verification and;
If the 203rd, preset region of memory be stored with the first verification and, using the first data generation second verification and, and will Second verifies and verifies and contrasted with first;
If the 204th, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
The phase that step 202 in the present embodiment describes to step 204 with step 101 in embodiment illustrated in fig. 1 to step 103 Hold inside the Pass identical, here is omitted.
The 205th, if module M default verification switch is not opened, or default region of memory do not store the first verification and, if or the Two verification and with first verification and it is identical, then the first data are sent to module M+K.
In the present embodiment, if module M default verification switch is not opened, the first data can be sent to module M+K.
Other related contents of step 205 may be referred to what is illustrated in embodiment illustrated in fig. 1 in step 104 in the present embodiment Content, here is omitted.
Based on embodiment illustrated in fig. 2, the distributed field system based on the design of stack module is utilized to the first data below The write-in of system is illustrated with reading process:
The first data write request from last time application program enter distributed file system first module (first The write check switch of individual module is opened) when, the verification of the first data generation first can be utilized and and be stored in default region of memory In, then the first data can be issued to second module from first module, if the write check switch of second module closes Close, then can be directly by the first data distributing to the 3rd module, can profit if the write check switch of second module is opened The verification of the first data generation second that is received with second module and, and with the first verification of default region of memory and carrying out pair Than, if first verifies and verify and differ with second, it can determine that the first data mistake occur in second module, if the One verification and with the second verification and identical, then can continue the first data distributing to the 3rd module, like this one by one Module is walked downward, and is write until the first data in disk/solid-state disk.
Meanwhile for the read requests for the first data, enter distribution when reading the first data from disk/solid-state disk During bottom module (the read check switch of bottom module is opened) of file system, the first data generation read can be utilized First verification and, and be stored in default region of memory, then the first data can be pulled back to reciprocal the from bottom module Two modules, if the read check switch of penultimate module is closed, directly the first data can be pulled back to third from the bottom Individual module, if the read check switch of penultimate module is opened, the first number that penultimate module can be utilized to receive According to the verification of generation second and, and with the first of default region of memory the verification and being contrasted, if the first verification and with the second verification With differ, then can determine that the first data mistake occur in penultimate module, if first verification and with second verification and It is identical, then it can continue the first data pulling back to third last module, module is up walked one by one like this, until handle First data return to user.
Referring to Fig. 3, another embodiment of verification method includes in the embodiment of the present invention:
301st, when module M receives the first data, whether detection module M default verification switch is opened;
If the 302, module M default verification switch is opened, detect default region of memory whether be stored with the first verification and;
Step 301 in this implementation is identical to step 202 with the step 201 in embodiment illustrated in fig. 2 to step 302, this Place repeats no more.
If the 303rd, preset region of memory be stored with the first verification and, and be stored with the first verification and corresponding second data Whether the second data length, the second data length of detection change;
In the present embodiment, if default region of memory be stored with the first verification and, and be stored with the first verification and corresponding the Second data length of two data, then it can detect whether the second data length changes in advance.
Specifically, for the first data verified using passing through or enter due to the first verification and for the first time distributed file system The first data generation, then understand the second data be by verify the first data or enter distributed file system for the first time The first data, then by detect the second data the second data length whether change, the first data can be detected in phase Whether there is mistake in the write-in answered or reading process.
If the 304, the second data length does not change, using the verification of the first data generation second and, and by the second school Test and verify and contrasted with first;
In the present embodiment, if the second data length does not change, it can be initially believed that the first data do not occur mistake, And can verify and be contrasted using the first verification and second with being generated using the first data, with further to the first data It is made whether the checking of mistake occur.
It is understood that in the present embodiment, if the second data length changes, then default memory field can be determined First in domain verifies and has malfunctioned, then the first verification can not be utilized and to the first data verification, to reduce system-computed Load.
Further, in the present embodiment, after determining that the second data length of the second data changes, second can be carried out Data length reports an error, to allow staff to analyze the error reason of the second data length.
If the 305th, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
The 306th, if module M default verification switch is not opened, or default region of memory do not store the first verification and, if or the Two verification and with first verification and it is identical, then the first data are sent to module M+K.
Step 304 in the present embodiment is identical to step 205 with the step 203 in embodiment illustrated in fig. 2 to step 306, Here is omitted.
Further, the first verification is not stored in default storage region and/or determine that the first data do not occur mistake in module M After by mistake, the first data length of the first data can also be stored in default region of memory, first data length can be more New second data length, it can also be not specifically limited herein without renewal.
Referring to Fig. 4, another embodiment of verification method includes in the embodiment of the present invention:
401st, when module M receives the first data, whether detection module M default verification switch is opened;
If the 402, module M default verification switch is opened, detect default region of memory whether be stored with the first verification and;
Step 401 in this implementation is identical to step 302 with the step 301 in embodiment illustrated in fig. 3 to step 402, this Place repeats no more.
If the 403rd, preset region of memory be stored with the first verification and, and be stored with detection preset magic number, detect preset magic number Whether change;
In the present embodiment, if default region of memory be stored with the first verification and, and be stored with default magic number, then can be advance Detect whether the second data length changes.
Specifically, due to magic number be it is fixed, then in the present embodiment, once the default magic number of default region of memory occurs Change, then can be defaulted as the first verification and be changed with the second data length of the second data, conversely, then can consider First verifies and is not malfunctioned with the second data length of the second data.
If the 404, presetting magic number not change, and it is stored with the second data length of the first verification and corresponding second data Degree, then detect whether the second data length changes;
It is understood that in the present embodiment, changed if presetting magic number, then the with the second data can be determined Two data lengths have malfunctioned, then the second data length of the second data can not be detected, be born with reducing system-computed Carry.
If the 405, the second data length does not change, using the verification of the first data generation second and, and by the second school Test and verify and contrasted with first;
If the 406th, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
The 407th, if module M default verification switch is not opened, or default region of memory do not store the first verification and, or second Verification and with first verification and it is identical, then the first data are sent to module M+K.
Step 404 in the present embodiment is identical to step 306 with the step 303 in embodiment illustrated in fig. 3 to step 407, Here is omitted.
Above-mentioned embodiment illustrated in fig. 3 and embodiment illustrated in fig. 4 can first verification and before use, first to first verification and Whether error is tested, to avoid the first bad checksum but the first data correctly judge scene by accident, and then can be effectively False Rate is reduced, improves system reliability.
Referring to Fig. 5, another embodiment of verification method includes in the embodiment of the present invention:
501st, when module M receives the first data, whether detection module M default verification switch is opened;
If the 502, module M default verification switch is opened, detect default region of memory whether be stored with the first verification and;
If the 503rd, preset region of memory be stored with the first verification and, and be stored with detection preset magic number, detect preset magic number Whether change;
If the 504, presetting magic number not change, and it is stored with the second data length of the first verification and corresponding second data Degree, then detect whether the second data length changes;
If the 505, the second data length does not change, using the verification of the first data generation second and, and by the second school Test and verify and contrasted with first;
If the 506th, second verify and verify and differ with first, it is determined that the first data mistake occur in module M;
Step 501 in this implementation is identical to step 406 with the step 401 in embodiment illustrated in fig. 4 to step 506, this Place repeats no more.
If the 507th, second verification and with first verification and it is identical, and be stored with the predeterminated position of the second data second sampling Data, then the second sampled data and the first sampled data are contrasted;
In the present embodiment, if the second verification and with the first verification and identical, and be stored with the predeterminated position of the second data Second sampled data, then the second sampled data and the first sampled data can be contrasted.
Specifically, the first sampled data is acquired for the predeterminated position in the first data, because the second data are The first data or first the first data for entering distributed file system by checking, then contrast the first hits by detecting According to the second sampled data of the predeterminated position with the second data, the first data can be detected in corresponding write-in or reading process Whether mistake is occurred.Thus, it is possible to prevent the first verification and do not malfunction, but the first data after distorting and the first number before distorting According to the verification of generation and identical and be mistakenly considered to fail to judge caused by the first data are not distorted.
Wherein, in order to avoid the second sampled data is excessive and causes space hold of second data to default region of memory, The size of second data is can be with 200 times to 1000 times of the size of the second sampled data.
The 508th, if module M default verification switch is not opened, or default region of memory do not store the first verification and, or second The sampled data of sampled data first is identical, then sends the first data to module M+K.
Step 508 in the present embodiment is identical with the step 407 in embodiment illustrated in fig. 4, and here is omitted.
Further, the first verification is not stored in default storage region and/or determine that the first data do not occur mistake in module M After by mistake, the first sampled data of the predeterminated position of the first data can also be stored in default region of memory, first sampling Data can update the second sampled data, can also be not specifically limited herein without renewal.
It is understood that the explanation based on above-described embodiment, when default region of memory do not store the first verification and when, can With in the verification of default storage region storage second and, or, can also store the second verification and with default magic number, the first data At least one of the first sampled data of predeterminated position of first data length, the first data, and using the second verification and as First verifies and then in actual applications, can also include more embodiments, above-described embodiment is by way of example only.
It should be noted that default storage region be stored with the second verification and with default magic number, the first number of the first data , can be by the second verification and with presetting during according at least one of length, the first sampled data of the predeterminated position of the first data At least one of magic number, the first data length, first sampled data are handled according to preset format, obtain the 3rd data, And default region of memory is stored in the form of the 3rd data, it is not specifically limited herein.
Preferably, when being tampered due to data, the possibility distorted from the head and the tail both ends of data is larger, then is sent out to improve Existing second verification sum distorts possibility, the second verification and the head and the tail both ends that can not be located at the 3rd data.
The verification method in the embodiment of the present invention is illustrated respectively above, below to testing in the embodiment of the present invention Card device illustrates, and the checking device is applied to the distributed file system based on the design of stack module, distributed document System includes N number of module, and N is the positive integer not less than 2:
Referring to Fig. 6, verify that device one embodiment includes in the embodiment of the present invention:
First detection unit 601, for when module M receives the first data, detecting whether default region of memory stores There is the first verification corresponding to the first data and M is the positive integer no more than N;
Generation unit 602, for when default region of memory be stored with the first verification and when, then utilize the first data generation the Two verification and;
Comparison unit 603, for verifying and being contrasted by the second verification and with first;
First determining unit 604, for when second verifies and verify and differ with first, it is determined that the first data exist There is mistake in module M.
Optionally, in some embodiments of the invention, based on Fig. 6, as shown in fig. 7, device can further include:
Whether the second detection unit 605, the default verification switch for detection module M are opened;
First trigger element 606, for when module M default verification is switched and opened, then triggering the inspection of the first detection unit Survey default region of memory whether be stored with the first verification and.
Optionally, in some embodiments of the invention, based on Fig. 7, as shown in figure 8, device can further include:
Second determining unit 607, for determining the load of distributed file system;
Opening unit 608, for according to the height of load open W module corresponding to preset verification switch, W for no more than N positive integer.
Optionally, in some embodiments of the invention, opening unit 607, can further be specifically used for:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
Optionally, in some embodiments of the invention, based on Fig. 8, as shown in figure 9, device can further include:
Transmitting element 609, for when default region of memory do not store the first verification and, or module M default verification switch Do not open, or the second verification and with the first verification and it is identical when, then the first data are sent to module M+K, K is -1 or 1.
Optionally, in some embodiments of the invention, based on Fig. 9, as shown in Figure 10, device can also be wrapped further Include:
Memory cell 610, for when default region of memory do not store the first verification and when, in default storage region storage the Two verification and, or storage second verification and with default magic number, the first data length of the first data, the first data predeterminated position At least one of the first sampled data, and using the second verification and as the first verification with.
Optionally, in some embodiments of the invention, based on Figure 10, as shown in figure 11, when default storage region stores Have the first verification and with first verification and corresponding second data the second data length when, device can further include:
3rd detection unit 611, for detecting whether the second data length changes;
Second trigger element 612, first is utilized for when the second data length does not change, then triggering generation unit Data generation second verification and.
Optionally, in some embodiments of the invention, based on Figure 11, as shown in figure 12, when default storage region is also deposited Contain detection preset magic number when, device can further include:
4th detection unit 613, for detecting whether default magic number changes;
3rd trigger element 614, for when default magic number does not change, then triggering the 3rd detection unit detection second Whether data length changes.
Optionally, in some embodiments of the invention, when default storage region is also stored with the default position of the second data During the second sampled data put, transmitting element 208, can further it be specifically used for:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
The angle of slave module functional entity is retouched to the five application page display device in the embodiment of the present invention above State, the computer installation in the embodiment of the present invention is described from the angle of hardware handles below, the computer installation can answer For the distributed file system designed based on stack module, distributed file system includes N number of module, and N is not less than 2 Positive integer:
Computer device one embodiment of the embodiment of the present invention includes:
Processor and memory;
Memory is used to store computer program, can when processor is used to perform the computer program stored in memory To realize following steps:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also To realize following steps:
Whether detection module M default verification switch is opened;
If so, then detection trigger preset region of memory whether be stored with the first verification and the step of.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also To realize following steps:
Determine the load of distributed file system;
Verification switch is preset according to corresponding to the height of load opens W module, W is the positive integer no more than N.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also To realize following steps:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also To realize following steps:
If default region of memory do not store the first verification and, or module M default verification switch do not open, or the second verification With with the first verification and identical, then the first data are sent to module M+K, K is -1 or 1.
In some embodiments of the invention, when processor is used to perform the computer program stored in memory, may be used also To realize following steps:
When default region of memory do not store the first verification and when, default storage region storage second verification and, or storage Second verification and with default magic number, the first data length of the first data, the first data predeterminated position the first sampled data At least one of, and using second verification and as first verification with.
In some embodiments of the invention, when default storage region is stored with the first verification and is verified with first and corresponding The second data the second data length when, processor is used for when performing the computer program stored in memory, can also be real Existing following steps:
Detect whether the second data length changes;
If it is not, then triggering using the first data generation second verification and the step of.
In some embodiments of the invention, when default storage region, which is also stored with detection, presets magic number, processor is used When the computer program stored in memory is performed, following steps can also be realized:
Detection presets whether magic number changes;
If it is not, the step of then whether data length of detection trigger second changes.
In some embodiments of the invention, when default storage region is also stored with the second of the predeterminated position of the second data During sampled data, when processor is used to perform the computer program stored in memory, following steps can also be realized:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
It is understood that also may be used described in computing device in the computer installation of described above during computer program To realize the function of each unit in above-mentioned corresponding each device embodiment, here is omitted.Exemplary, the computer journey Sequence can be divided into one or more module/units, and one or more of module/units are stored in the memory In, and by the computing device, to complete the present invention.One or more of module/units can be can complete it is specific The series of computation machine programmed instruction section of function, the instruction segment are used to describe the computer program in the checking device Implementation procedure.For example, the computer program can be divided into each unit in above-mentioned checking device, each unit can be realized The concrete function that accordingly checking device illustrates as described above.
The computer installation can be that the calculating such as desktop PC, notebook, palm PC and cloud server are set It is standby.The computer installation may include but be not limited only to processor, memory.It will be understood by those skilled in the art that processor, Memory is only the example of computer installation, does not form the restriction to computer installation, can be included more or less Part, some parts or different parts are either combined, such as the computer installation can also be set including input and output Standby, network access equipment, bus etc..
The processor can be CPU (Central Processing Unit, CPU), can also be it His general processor, digital signal processor (Digital Signal Processor, DSP), application specific integrated circuit (Application Specific Integrated Circuit, ASIC), ready-made programmable gate array (Field- Programmable GateArray, FPGA) either other PLDs, discrete gate or transistor logic, Discrete hardware components etc..General processor can be microprocessor or the processor can also be any conventional processor Deng the processor is the control centre of the computer installation, utilizes various interfaces and the whole computer installation of connection Various pieces.
The memory can be used for storing the computer program and/or module, and the processor is by running or performing The computer program and/or module being stored in the memory, and the data being stored in memory are called, described in realization The various functions of computer installation.The memory can mainly include storing program area and storage data field, wherein, storage program Area can storage program area, application program needed at least one function etc.;Storage data field can store the use according to terminal Data created etc..In addition, memory can include high-speed random access memory, non-volatile memories can also be included Device, such as hard disk, internal memory, plug-in type hard disk, intelligent memory card (Smart Media Card, SMC), secure digital (Secure Digital, SD) card, flash card (Flash Card), at least one disk memory, flush memory device or other volatibility are consolidated State memory device.
Based on method for writing data, present invention also offers a kind of computer-readable recording medium, this is computer-readable to deposit Storage media can be applied to the distributed file system based on the design of stack module, and distributed file system includes N number of module, N For the positive integer not less than 2, computer program is stored with the computer-readable recording medium, computer program is held by processor During row, it is possible to achieve following steps:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to the first data Verification and, M is positive integer no more than N;
If so, then using the first data generation second verification and, and by second verification and with first verification and contrasted;
If second verifies and verifies and differ with first, it is determined that the first data mistake occur in module M.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, following steps can also be realized:
Whether detection module M default verification switch is opened;
If so, then detection trigger preset region of memory whether be stored with the first verification and the step of.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, following steps can also be realized:
Determine the load of distributed file system;
Verification switch is preset according to corresponding to the height of load opens W module, W is the positive integer no more than N.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, following steps can also be realized:
The importance of N number of module is sorted according to principle from high to low;
According to the height of load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, following steps can also be realized:
If default region of memory do not store the first verification and, or module M default verification switch do not open, or the second verification With with the first verification and identical, then the first data are sent to module M+K, K is -1 or 1.
In some embodiments of the invention, the computer program of computer-readable recording medium storage is executed by processor When, following steps can also be realized:
When default region of memory do not store the first verification and when, default storage region storage second verification and, or storage Second verification and with default magic number, the first data length of the first data, the first data predeterminated position the first sampled data At least one of, and using second verification and as first verification with.
In some embodiments of the invention, when default storage region is stored with the first verification and is verified with first and corresponding The second data the second data length when, when the computer program of computer-readable recording medium storage is executed by processor, Following steps can also be realized:
Detect whether the second data length changes;
If it is not, then triggering using the first data generation second verification and the step of.
In some embodiments of the invention, when default storage region, which is also stored with detection, presets magic number, computer can When the computer program of reading storage medium storage is executed by processor, following steps can also be realized:
Detection presets whether magic number changes;
If it is not, the step of then whether data length of detection trigger second changes.
In some embodiments of the invention, when default storage region is also stored with the second of the predeterminated position of the second data During sampled data, when the computer program of computer-readable recording medium storage is executed by processor, following step can also be realized Suddenly:
If second verification and with first verification and it is identical, the second sampled data and the first sampled data are contrasted;
If the second sampled data is identical with the first sampled data, the first data are sent to module M+K.
If it is understood that the integrated unit is realized in the form of SFU software functional unit and is used as independent production Product are sold or in use, can be stored in a corresponding computer read/write memory medium.Based on such understanding, this hair The bright all or part of flow realized in above-mentioned corresponding embodiment method, correlation can also be instructed by computer program Hardware is completed, and described computer program can be stored in a computer-readable recording medium, the computer program is being located Manage device perform when, can be achieved above-mentioned each embodiment of the method the step of.Wherein, the computer program includes computer program generation Code, the computer program code can be source code form, object identification code form, executable file or some intermediate forms Deng.The computer-readable medium can include:Any entity or device, the record of the computer program code can be carried It is medium, USB flash disk, mobile hard disk, magnetic disc, CD, computer storage, read-only storage (ROM, Read-OnlyMemory), random Access memory (RAM, Random Access Memory), electric carrier signal, telecommunication signal and software distribution medium etc..Need It is noted that the content that includes of the computer-readable medium can be according to legislation in jurisdiction and patent practice will Ask and carry out appropriate increase and decrease, such as in some jurisdictions, do not included according to legislation and patent practice, computer-readable medium Electric carrier signal and telecommunication signal.
It is apparent to those skilled in the art that for convenience and simplicity of description, the system of foregoing description, The specific work process of device and unit, the corresponding process in preceding method embodiment is may be referred to, will not be repeated here.
In several embodiments provided herein, it should be understood that disclosed system, apparatus and method can be with Realize by another way.For example, device embodiment described above is only schematical, for example, the unit Division, only a kind of division of logic function, can there is other dividing mode, such as multiple units or component when actually realizing Another system can be combined or be desirably integrated into, or some features can be ignored, or do not perform.It is another, it is shown or The mutual coupling discussed or direct-coupling or communication connection can be the indirect couplings by some interfaces, device or unit Close or communicate to connect, can be electrical, mechanical or other forms.
The unit illustrated as separating component can be or may not be physically separate, show as unit The part shown can be or may not be physical location, you can with positioned at a place, or can also be distributed to multiple On NE.Some or all of unit therein can be selected to realize the mesh of this embodiment scheme according to the actual needs 's.
In addition, each functional unit in each embodiment of the present invention can be integrated in a processing unit, can also That unit is individually physically present, can also two or more units it is integrated in a unit.
Described above, the above embodiments are merely illustrative of the technical solutions of the present invention, rather than its limitations;Although with reference to before Embodiment is stated the present invention is described in detail, it will be understood by those within the art that:It still can be to preceding State the technical scheme described in each embodiment to modify, or equivalent substitution is carried out to which part technical characteristic;And these Modification is replaced, and the essence of appropriate technical solution is departed from the spirit and scope of various embodiments of the present invention technical scheme.

Claims (13)

1. a kind of verification method, applied to the distributed file system designed based on stack module, the distributed field system System includes N number of module, and the N is the positive integer not less than 2, it is characterised in that including:
When module M receives the first data, detect whether default region of memory is stored with first corresponding to first data Verification and, the M is positive integer no more than N;
If so, then using first data generation second verification and, and by described second verify and with described first verification and Contrasted;
If described second verifies and verifies and differ with described first, it is determined that first data occur in the module M Mistake.
2. according to the method for claim 1, it is characterised in that whether be stored with first in the default region of memory of the detection With before, methods described also includes for verification:
Whether the default verification switch for detecting the module M is opened;
If so, then trigger the default region of memory of detection whether be stored with the first verification and the step of.
3. according to the method for claim 2, it is characterised in that methods described also includes:
Determine the load of the distributed file system;
Verification switch is preset according to corresponding to the height of the load opens W module, the W is the positive integer no more than N.
4. according to the method for claim 3, it is characterised in that described that W module pair is opened according to the height of the load The default verification switch answered includes:
The importance of N number of module is sorted according to principle from high to low;
According to the height of the load, open and verification switch is preset corresponding to W module for sorting forward in N number of module.
5. according to the method for claim 4, it is characterised in that when the M is 1, the default verification switch is to open State;
When the M is N, the default verification switch is opening.
6. the method according to any one of claim 2 to 5, it is characterised in that methods described also includes:
If the default region of memory do not store it is described first verification and, or the module M default verification switch do not open, or Second verification and with the described first verification and identical, then first data are sent to module M+K, the K for -1 or 1。
7. according to the method for claim 6, it is characterised in that methods described also includes:
When the default region of memory do not store first verification and when, in the verification of default storage region storage second With, or storage it is described second verification and with default magic number, the first data length of first data, first data it is pre- If at least one of first sampled data of position, and described second is verified and as the described first verification and.
8. according to the method for claim 7, it is characterised in that when the default storage region is stored with first verification During with the second data length with the described first verification and corresponding second data, the is generated using first data described With before, methods described also includes for two verifications:
Detect whether second data length changes;
If it is not, then trigger it is described using first data generation second verification and the step of.
9. according to the method for claim 8, it is characterised in that when the default storage region is also stored with the detection in advance If during magic number, before whether detection second data length changes, methods described also includes:
Detect whether the default magic number changes;
If it is not, the step of whether detection second data length changes then triggered.
10. according to the method for claim 9, it is characterised in that when the default storage region is also stored with described second During the second sampled data of the predeterminated position of data, if it is described second verification and with described first verification and it is identical, Then first data, which are sent to module M+K, includes:
If it is described second verification and with described first verification and it is identical, by second sampled data and first hits According to being contrasted;
If the second sampled data is identical with the first sampled data, first data are sent to module M+K.
11. one kind checking device, applied to the distributed file system designed based on stack module, the distributed field system System includes N number of module, and the N is the positive integer not less than 2, it is characterised in that including:
First detection unit, for when module M receives the first data, detect whether default region of memory is stored with described the First verification corresponding to one data and, the M is positive integer no more than N;
Generation unit, for when the default region of memory be stored with it is described first verification and when, then utilize first data Generation second verification and;
Comparison unit, for being verified described second and verifying and contrasted with described first;
First determining unit, for when described second verifies and verify and differ with described first, it is determined that described first There is mistake in the module M in data.
A kind of 12. computer installation, it is characterised in that:The computer installation includes processor, and the processor is used to perform Realized during the computer program stored in memory as described in any one in claim 1 to 10 the step of verification method.
13. a kind of computer-readable recording medium, is stored thereon with computer program, it is characterised in that:The computer program Realized when being executed by processor as described in any one in claim 1 to 10 the step of verification method.
CN201711059135.5A 2017-11-01 2017-11-01 Verification method and device, computer device and readable storage medium Active CN107844714B (en)

Priority Applications (1)

Application Number Priority Date Filing Date Title
CN201711059135.5A CN107844714B (en) 2017-11-01 2017-11-01 Verification method and device, computer device and readable storage medium

Applications Claiming Priority (1)

Application Number Priority Date Filing Date Title
CN201711059135.5A CN107844714B (en) 2017-11-01 2017-11-01 Verification method and device, computer device and readable storage medium

Publications (2)

Publication Number Publication Date
CN107844714A true CN107844714A (en) 2018-03-27
CN107844714B CN107844714B (en) 2021-04-09

Family

ID=61681288

Family Applications (1)

Application Number Title Priority Date Filing Date
CN201711059135.5A Active CN107844714B (en) 2017-11-01 2017-11-01 Verification method and device, computer device and readable storage medium

Country Status (1)

Country Link
CN (1) CN107844714B (en)

Cited By (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN109376031A (en) * 2018-09-27 2019-02-22 潍柴动力股份有限公司 A kind of method and device for preventing the verification erroneous judgement of the memory block EEPROM from occurring
CN110955916A (en) * 2018-09-26 2020-04-03 深信服科技股份有限公司 Data integrity protection method, system and related equipment
CN111241005A (en) * 2020-01-09 2020-06-05 杭州涂鸦信息技术有限公司 Key value pair-based safe partition storage method and system
CN111459496A (en) * 2020-04-07 2020-07-28 珠海格力电器股份有限公司 Method for generating tamper-proof program file and method for upgrading equipment
CN113110697A (en) * 2021-04-16 2021-07-13 深圳市富视康智能股份有限公司 Time calibration method, device, equipment and storage medium
CN115150024A (en) * 2022-09-02 2022-10-04 无锡沐创集成电路设计有限公司 Data processing method, device, equipment and medium

Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120096270A1 (en) * 2007-11-06 2012-04-19 Men Long End-to-end network security with traffic visibility
CN104219027A (en) * 2014-09-05 2014-12-17 四川长虹电器股份有限公司 Distributed file security storage system capable of correcting file transmission error and method of system
CN104410493A (en) * 2014-11-07 2015-03-11 南方电网科学研究院有限责任公司 Secure data storage method and secure data read method based on distributed system infrastructure
CN104468035A (en) * 2014-11-13 2015-03-25 北京航空航天大学 Distributed type POS data reliability transmission system and method
CN107070613A (en) * 2017-03-22 2017-08-18 公安部交通管理科学研究所 Reliable data transmission method under distributed network environment
US20170249199A1 (en) * 2016-02-26 2017-08-31 Red Hat, Inc. Correlation-Based Monitoring and Events for a Unified Storage Manager

Patent Citations (6)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
US20120096270A1 (en) * 2007-11-06 2012-04-19 Men Long End-to-end network security with traffic visibility
CN104219027A (en) * 2014-09-05 2014-12-17 四川长虹电器股份有限公司 Distributed file security storage system capable of correcting file transmission error and method of system
CN104410493A (en) * 2014-11-07 2015-03-11 南方电网科学研究院有限责任公司 Secure data storage method and secure data read method based on distributed system infrastructure
CN104468035A (en) * 2014-11-13 2015-03-25 北京航空航天大学 Distributed type POS data reliability transmission system and method
US20170249199A1 (en) * 2016-02-26 2017-08-31 Red Hat, Inc. Correlation-Based Monitoring and Events for a Unified Storage Manager
CN107070613A (en) * 2017-03-22 2017-08-18 公安部交通管理科学研究所 Reliable data transmission method under distributed network environment

Non-Patent Citations (1)

* Cited by examiner, † Cited by third party
Title
申爱花: "基于分布式文件系统GlusterFS的安全技术研究", 《中国优秀硕士学位论文全文数据库》 *

Cited By (9)

* Cited by examiner, † Cited by third party
Publication number Priority date Publication date Assignee Title
CN110955916A (en) * 2018-09-26 2020-04-03 深信服科技股份有限公司 Data integrity protection method, system and related equipment
CN110955916B (en) * 2018-09-26 2023-09-05 深信服科技股份有限公司 Data integrity protection method, system and related equipment
CN109376031A (en) * 2018-09-27 2019-02-22 潍柴动力股份有限公司 A kind of method and device for preventing the verification erroneous judgement of the memory block EEPROM from occurring
CN109376031B (en) * 2018-09-27 2022-10-25 潍柴动力股份有限公司 Method and device for preventing error judgment of check of EEPROM storage area
CN111241005A (en) * 2020-01-09 2020-06-05 杭州涂鸦信息技术有限公司 Key value pair-based safe partition storage method and system
CN111459496A (en) * 2020-04-07 2020-07-28 珠海格力电器股份有限公司 Method for generating tamper-proof program file and method for upgrading equipment
CN113110697A (en) * 2021-04-16 2021-07-13 深圳市富视康智能股份有限公司 Time calibration method, device, equipment and storage medium
CN115150024A (en) * 2022-09-02 2022-10-04 无锡沐创集成电路设计有限公司 Data processing method, device, equipment and medium
CN115150024B (en) * 2022-09-02 2022-11-18 无锡沐创集成电路设计有限公司 Data processing method, device, equipment and medium

Also Published As

Publication number Publication date
CN107844714B (en) 2021-04-09

Similar Documents

Publication Publication Date Title
CN107844714A (en) A kind of verification method and device, computer installation, readable storage medium storing program for executing
CN109491905A (en) Head end test method, apparatus and electronic equipment
CN110502374A (en) The traffic capture debugging tool of the basic reason of equipment fault when identification is tested automatically
CN110334007A (en) A kind of functional interface calls verification method and device, electronic equipment and storage medium
CN105975726A (en) Verification method and platform based on SystemVerilog language
CN109802864A (en) Chip design and verification method, device and chip tester
CN109033772A (en) A kind of input method and device of verification information
CN105022694B (en) Method for generating test case and system for mobile terminal test
CN109189405A (en) A kind of method and system of proving program Flash data consistency
US20080008021A1 (en) Method for recognizing and verifying fifo structures in integrated circuit designs
CN110442513A (en) Execution method, apparatus, computer equipment and the storage medium of functional test use-case
CN109358993A (en) The processing method and processing device of deep neural network accelerator failure
CN109445837A (en) A kind of dissemination method and equipment of application program
CN107832208A (en) The automatic test approach and terminal device of software
US7275231B2 (en) High level validation of designs and products
CN107850641A (en) The whole-system verification of on-chip system (SoC)
CN101681392A (en) Constrained random simulation coverage closure guided by a cover property
CN107966648B (en) A kind of embedded failure diagnosis method based on correlation matrix
CN109766259A (en) A kind of classifier test method and system based on compound transformation relationship
CN109376079A (en) The test method and server that interface calls
CN110515755A (en) Interface function verification method, device, equipment and computer readable storage medium
CN107451058A (en) A kind of software development methodology and device
CN110399304A (en) A kind of test method and system of script
CN104700900B (en) A kind of detecting system and method for memory Single event upset effecf
CN104780123B (en) A kind of network pack receiving and transmitting processing unit and its design method

Legal Events

Date Code Title Description
PB01 Publication
PB01 Publication
SE01 Entry into force of request for substantive examination
SE01 Entry into force of request for substantive examination
GR01 Patent grant
GR01 Patent grant